Analysis
-
max time kernel
133s -
max time network
143s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
02-02-2021 13:31
Static task
static1
Behavioral task
behavioral1
Sample
RE_BOEING3A78_NEW_ORDERS_E4G60K1G7_PDF.js
Resource
win7v20201028
Behavioral task
behavioral2
Sample
RE_BOEING3A78_NEW_ORDERS_E4G60K1G7_PDF.js
Resource
win10v20201028
General
-
Target
RE_BOEING3A78_NEW_ORDERS_E4G60K1G7_PDF.js
-
Size
466KB
-
MD5
83ef3f626544cef2f0962863ab109634
-
SHA1
48d5a062ea59ea06afc5334a43f2537390660538
-
SHA256
5a18ef3e027b211901758fa2ffeaa63ae1ab87cdd85188660ab839771abb9ecb
-
SHA512
d9f127a33cb2a42b610e3f0e7ad057233e9491a37fc8342f92b216e6f1a3a470e26487bab74cb40209d5c084429db78152ed7266aaa1b56633aa0c6239c591e9
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.zolvtek.com/ - Port:
21 - Username:
[email protected] - Password:
bird0006
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
WSHRAT Payload 2 IoCs
resource yara_rule behavioral2/files/0x0008000000000687-3.dat family_wshrat behavioral2/files/0x000200000001ab59-4.dat family_wshrat -
AgentTesla Payload 2 IoCs
resource yara_rule behavioral2/files/0x000200000001ab5a-6.dat family_agenttesla behavioral2/files/0x000200000001ab5a-7.dat family_agenttesla -
Blocklisted process makes network request 7 IoCs
flow pid Process 5 3656 wscript.exe 7 3656 wscript.exe 14 3656 wscript.exe 15 3656 wscript.exe 17 3656 wscript.exe 18 3656 wscript.exe 19 3656 wscript.exe -
Executes dropped EXE 1 IoCs
pid Process 3000 234.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RE_BOEING3A78_NEW_ORDERS_E4G60K1G7_PDF.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RE_BOEING3A78_NEW_ORDERS_E4G60K1G7_PDF.js wscript.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RE_BOEING3A78_NEW_ORDERS_E4G60K1G7_PDF = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\RE_BOEING3A78_NEW_ORDERS_E4G60K1G7_PDF.js\"" wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\File Transfer Protocol = "C:\\Users\\Admin\\AppData\\Roaming\\File Transfer Protocol\\File Transfer Protocol.exe" 234.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\RE_BOEING3A78_NEW_ORDERS_E4G60K1G7_PDF = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\RE_BOEING3A78_NEW_ORDERS_E4G60K1G7_PDF.js\"" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RE_BOEING3A78_NEW_ORDERS_E4G60K1G7_PDF = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\RE_BOEING3A78_NEW_ORDERS_E4G60K1G7_PDF.js\"" wscript.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\software\microsoft\windows\currentversion\run wscript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run wscript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\RE_BOEING3A78_NEW_ORDERS_E4G60K1G7_PDF = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\RE_BOEING3A78_NEW_ORDERS_E4G60K1G7_PDF.js\"" wscript.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3000 234.exe 3000 234.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3000 234.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1048 wrote to memory of 3656 1048 wscript.exe 75 PID 1048 wrote to memory of 3656 1048 wscript.exe 75 PID 3656 wrote to memory of 3000 3656 wscript.exe 76 PID 3656 wrote to memory of 3000 3656 wscript.exe 76 PID 3656 wrote to memory of 3000 3656 wscript.exe 76
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\RE_BOEING3A78_NEW_ORDERS_E4G60K1G7_PDF.js1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\RE_BOEING3A78_NEW_ORDERS_E4G60K1G7_PDF.js"2⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3656 -
C:\Users\Admin\AppData\Roaming\234.exe"C:\Users\Admin\AppData\Roaming\234.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3000
-
-